Archive for Kwiecień, 2014

Hilarious, Critically-Acclaimed Shooter Marches Out of the Trenches, Prepared for Combat on Origin for PC

PopCap Games, a division of Electronic Arts Inc. (NASDAQ: EA), today announced Plants vs. Zombies™ Garden Warfare will be available on Origin and other retailers for PC beginning June 27. Dubbed “a fun, refreshing family-friendly take on the multiplayer shooter” from New York Daily News, Plants vs. Zombies Garden Warfare is a best-in-class multiplayer third-person shooter, with all the fun and humor of the wildly popular Plants vs. Zombies franchise. Since its launch earlier this year on Xbox One and Xbox 360® video game and entertainment system, Plants vs. Zombies Garden Warfare has attracted global attention as critics and fans praised the game for being an unconventional shooter with a flawless blend of humor.

“We’ve had an amazing response from players since launching the Xbox platforms, and can’t wait for PC players to join the party this summer,” said Brian Lindley, Producer on Plants vs. Zombies Garden Warfare. “The PC version has all the great content that we have put out since launch like Garden Variety and Zomboss Down for players to enjoy from the start.”

In Plants vs. Zombies Garden Warfare, players choose a side and square off in riotous combat against their plant or zombie opponents, utilizing an arsenal of outrageous weaponry. Beloved character favorites from the franchise, including the Sunflower and Chomper, reprise their roles, and the game tops it off with a new cast of zany characters such as Ice Cactus and the Marine Biologist.

Plants vs. Zombies Garden Warfare features four distinct gameplay modes including 12 vs. 12 competitive multiplayer called “Gardens & Graveyards” and “Team Vanquish,” as well as 8v8 Gnome Bomb. If you prefer co-op gameplay a four-player co-operative mode called “Garden Ops” is available too! Plants vs. Zombies Garden Warfare for PC will also include all content from the Garden Variety Pack & Zomboss Down, a Wild West themed update with eight new playable characters, more than 200 wild customizations and a Cactus Canyon map.

Starting today, Players can also pre-order the Origin Digital Deluxe edition, which includes two Booster Packs, in-game coins and an exclusive character customization pack.

Join the Plants vs. Zombies Garden Warfare community at https://www.facebook.com/GardenWarfarePvZ and follow us on Twitter @PlantsvsZombies.

Fortinet, a global leader in high-performance network security, announced its FortiSandbox-3000D as one of the top rated Breach Detection Systems (BDS), delivering 99 percent breach detection and zero false positives, based on real-world comparative analysis conducted by third party NSS Labs.

A Recommended rating from NSS Labs indicates that a product has performed well and deserves strong consideration. Only the top technical products earn a Recommended rating from NSS—regardless of market share, company size or brand recognition.

“Real-world third-party validation is an essential resource for enterprises considering security products to help cut through confusion caused by vendor marketing,” said Fortinet CEO Ken Xie. “NSS Labs’ testing continues to demonstrate Fortinet’s commitment to meet high industry standards for security detection, performance, reliability, management and value. In this case, Fortinet’s FortiGuard Labs expertise was integral in meeting and exceeding those high benchmarks, which are increasingly necessary to combat sophisticated cyber-threats and today’s stealthy Advanced Persistent Threats.”

Leveraging sophisticated research and test infrastructure that collects real threats and attack methods for concurrent delivery to the systems under test (SUT), NSS Labs utilized empirical data from its first ever Breach Detection Systems Group Test to produce a Security Value Map (SVM). The SVM measures the security effectiveness and value (cost per protected Mbps) of tested product configurations. Fortinet’s FortiSandbox-3000D is one of the top performing systems out of six network security vendors (see Figure 1).

NSS Labs: “Recommends” FortiSandbox
As a result of testing against five other vendors’ products, Fortinet’s FortiSandbox-3000D earned a “Recommended” rating based on real-world testing that evaluated detection rate, device stability and reliability, effective management, performance and total cost of ownership. This latest vendor roundup is the industry’s most comprehensive third-party test of Breach Detection Systems to date.

According to the NSS Labs’ benchmark results, Fortinet’s FortiSandbox-3000D passed 100 percent of the tests that gauged the reliability and stability of the device. In addition, NSS analysis found the FortiSandbox-3000D to have a 99 percent threat detection rate in a real-world testing environment that included more than 1,800 live exploits and malware samples. Both threat detection and reliability and stability scores were factored into a metric that led to a 99 percent rating in overall security effectiveness.

NSS Labs tests also confirmed the FortiSandbox-3000D as a high-performance BDS solution, with the majority of detections happening in three minutes or less. The FortiSandbox-3000D tied for the highest number of TCP connections per second at 225,000, and the appliance accurately delivered on stated throughput claims.

The “Recommended” rating speaks to the criticality of real-world third party testing and Fortinet’s commitment to meeting and exceeding high industry standards.

When FortiSandbox is used in conjunction with a FortiGate NGFW and FortiGuard, Fortinet’s Advanced Threat Protection (ATP) solution provides access control, threat prevention, behavioral analysis, continuous and monitoring to provide the best protection against targeted attacks.
“The Fortinet FortiSandbox-3000D was tested and rated by NSS at 1,000 Mbps, which is in line with the vendor’s claim (Fortinet rates this device at 1,000 Mbps). NSS rated throughput is calculated as an average of the “Real-¬‐ World” Protocol Mixes (Enterprise Perimeter, Education), and the 21 KB HTTP response-¬‐based tests,” according to NSS Labs. “The Fortinet FortiSandbox-3000D detected 99% of HTTP malware, 98% of email malware, and 100% of exploits, giving an overall breach detection rating of 99.0%. The device passed all stability and reliability tests and detected 83% of evasions.”

About FortiSandbox-3000D
The FortiSandbox-3000D is a key component to help combat sophisticated malware and Advanced Persistent Threats (APTs) as part of a broader, integrated security framework.

The FortiSandbox consolidates specialized threat detection and intelligence services across protocols and functions into a single, high-performance and highly affordable appliance. At the core of the solution is a dual-level sandbox that effectively deals with the increasing sophistication of attacks that require more advanced inspection.

Key features include:

Proactive Antimalware

Real-time Cloud Query of Community Results

Code Emulation

Full Virtual Environment

Callback Detection

Actionable dashboards and reports

Optional Submission to FortiGuard

The FortiSandbox-3000D can be integrated with Fortinet’s FortiGate and FortiMail platforms for enhanced detection and threat mitigation or deployed on-premise on its own without changing any network configuration.

FortiSandbox Product Family
Further demonstrating the company’s commitment to the Breach Detection Systems space, in February this year, Fortinet announced theFortiSandbox-1000D, a unique dual-level sandbox that features proactive pre-filtering, dynamic threat intelligence and rich reporting for small to mid-sized enterprises. As with the FortiSandbox-3000D, the FortiSandbox-1000D offers a consolidated approach to covering all protocols and functions in one appliance with the ability to deploy stand-alone or as an integrated extension of FortiGate and FortiMail appliances.

Availability
The FortiSandbox-3000D is available now, and the FortiSandbox-1000D is expected to ship later this month. To learn more about the FortiSandbox family of Advanced Threat Detection products or other Fortinet network security products, please visit www.fortinet.com. For a no-risk evaluation of our FortiGate family of High Performance Data Center Firewalls, Enterprise Next Generation Firewalls or smaller Unified Threat Management devices, please visit: http://www.fortinet.com/how_to_buy/try_and_buy.html

Fortinet Webinar: Beyond the Hype: NSS Labs Tests Today’s Breach Detection Systems
On Tuesday, May 13, at 9:00 a.m. PT, Fortinet will host a live webinar with NSS Labs that will cover:

In demonstrating to Joburg citizens it is serious about service delivery and now being more accessible than ever before, the Johannesburg Road Agency (JRA) is launching its Find & Fix mobile application for testing by citizens. The official launch is set for 14 May 2014 once testing on all platforms is finalised.

“The app is the first of its kind to be launched in the Southern Hemisphere; Middle East, Asia, and Africa regions. Another African first for Joburg,” says Skhumbuzo Macozoma, MD of JRA explaining, “the Find & Fix app will assist the public to report potholes, faulty traffic signals, storm water drains, manhole covers, and other infrastructure issues related to JRA.”

The app will feature an accurate location with GPS co-ordinates and make it easy to provide photo evidence, which improves the JRA’s assessment of what is required to fix the fault, thereby enhancing efficiency and increasing productivity.

Once launched, the Find & Fix app will be free and easy to use and can be downloaded for most mobile Operating System platforms such as Windows Mobile, Android and iOS for Apple. Issues can thus be reported with just a few clicks.

“We call on citizens to join in testing this exciting and innovative application,” Macozoma comments, ”Residents can download the beta testing app for Microsoft platforms from 25 April, Android phones on 2 May and iOS systems on 9 May.”

The launch of this testing phase for the mobile app is part of the JRA service delivery drive called the “just tell us” campaign, which is an initiative to ensure that the JRA is more accessible to citizens and road users in the City. The “just tell us” campaign also seeks to stimulate the City’s “Active Citizentry” priority focus which promotes active involvement of citizens in the City’s service delivery activities.

Macozoma says, “JRA is taking its obligations very seriously, and we urge the community to be actively engaged, and report issues by using available contact points.”

The JRA has implemented an email address, as well as twitter and Facebook sites to allow residents to interact on platforms convenient to them. JRA is also launching the service delivery mailbox for service frustrations that have not been resolved the first time or as promised.

Macozoma says, “JRA is committed to become a centre of engineering excellence with service delivery efficiencies and satisfied customers.”

The JRA encourages residents to report all road and storm water related issues, including potholes to 0860 562 874/ hotline@jra.org.za / twitter @MyJra./ and the new JRA Find&Fix app

Veeam Software, innovative provider of solutions that deliver Availability for the Modern Data Centre, has won its 100,000th customer and posted record revenue results for the first quarter of 2014.

Veeam closed Q1’14 with 48% year-over-year growth of new license bookings. In addition, total bookings revenue growth for Q1 2014 was 56% for the same period, marking Veeam’s 25th consecutive quarter in which quarterly total bookings revenue has grown by more than 50% over the same period during the previous year.

“Veeam continues to bridge the gap between the requirements of the Always-On Business and IT’s ability to effectively deliver business continuity and IT resilience to the majority of businesses,” said Ratmir Timashev, CEO of Veeam. “Businesses are facing challenges such as data loss, long recovery times, unreliable data protection and a lack of visibility into their IT environments. Advanced data protection from Veeam, combined with virtualisation, the cloud and other enabling technologies, completes the modern data centre and ensures that the critical applications of our more than 100,000 customers remain always on from any place, at any time, on any device. Our recent partnership with NetApp as a part of Veeam Backup & Replication v8 is a testament to our ongoing mission to enable the Always-On Business by providing advanced data protection to the modern data centre.”

Additional highlights of Q1’14 include:

Customer Growth: More than 9,400 new customers were added in Q1, surpassing the milestone of 100,000 paid Veeam customers. Veeam continues to acquire new customers at a rate of 3,000 each month. This customer momentum has also led to Veeam’s first flagship event, Veeam ON: The World’s Premier Data Centre Availability Event, taking place 6-9 October 2014 at the Cosmopolitan in Las Vegas, NV. Veeam will bring together industry-leading experts and Veeam customers to learn how to enable the Always-On Business.

Veeam Cloud Provider (VCP) Program: To better serve the growing number of managed service providers (MSPs) who use Veeam Backup & Replication, Veeam joined the Kaseya Technology Alliance Program and developed an add-on for Kaseya Virtual System Administrator (VSA). “We are thrilled to have Veeam join the Kaseya ecosystem. The Veeam add-on dramatically simplifies management of joint customers’ virtualised environments by exposing Veeam data within the Kaseya management console,” said Don LeClair, EVP, Product Management at Kaseya. “Simplified, centralised management of cloud, on-premise, virtualised and distributed environments is Kaseya’s focus, and this integration with the virtualised backup market leader adds great strength to our offering.”

Veeam also added two new VCP rental aggregators in Q1: Insight (U.S.A.) and ECS (China).

New Partner Margins and Growth: As a 100 percent channel-based organisation, Veeam increased incentives and support to its worldwide partner base of 25,000 ProPartners. Veeam also launched its Veeam Certified Engineer (VMCE) certification, enabling partners to build professional services and solutions around Veeam within their own virtualisation practices.

State, Local and Higher Education (SLED) team: In response to Veeam’s continued growth of the SLED market, a team devoted specifically to this segment in North America has been created. This dedicated team understands the specific needs, demands and potential of this vertical. Veeam’s newly created SLED team will work closely with the public sector to ensure the challenges they face in maintaining an Always-On Business are supported and delivered.

Veeam received a number of prestigious industry honors during Q1’14, including the following:

InfoWorld 2014 Products of the Year: Veeam Backup & Replication v7 was named a winner among the best hardware, software, development tools and cloud services of the year.

2014 Virtualization Review Readers’ Choice Awards and Ultimate Buyers’ Guide: Veeam was named a finalist in two categories: Veeam Management Pack™ in the Virtualization Management and Optimization category and Veeam Backup & Replication in the Business Continuity category.

CIO 50 Award: Veeam customer ARGAS, which is based in Saudi Arabia, won as a high-performer IT organisation.

Channel Partner: Veeam’s ProPartner Program was recently awarded the top spot in a comprehensive comparative study of backup vendor channel programs conducted by Insalcon, a sales consulting firm, in partnership with Channel Partner, a German publication.

Storage Magazine Products of the Year: Veeam Backup & Replication v7 was named 2013 Product of the Year in the Backup and Disaster Recovery Software and Services category.

CRN 2014 Partner Program Guide: Veeam has been awarded a 5-Star rating in the CRN 2014 Partner Program Guide. The annual directory offers the information solution providers need to evaluate IT vendors they work with or are considering working with.

Aptronics, one of South Africa’s foremost black empowered IT solutions providers, achieved HP CloudSystem Matrix Delivery status when Gavin Williams received confirmation of his qualification in November 2013 as a recognised Matrix Master in both the EMEA (Europe, the Middle East and Africa) and MEMA (Middle East, Mediterranean and Africa) regions.

According to GSD Partner Country Manager at HP, Juane Celliers, the Master ASE Data Center and Cloud Architect V1 certification is designed for an elite group of top professionals across the globe and, as such, validates that Williams can expertly present, architect and oversee (at every level) the implementation of a highly-effective converged infrastructure and cloud solution. This includes both business and technical knowledge and experience.

“Gavin’s certification, which included solution design, build and deployment activities mentored by HP and testing of his knowledge through proctored exams, distinguishes us from our competitors as being able to both provide and implement solutions to customers, making the company a one-stop-shop for HP CloudSystem Matrix and hardware and software integrated services,” said Aptronics CEO, Anil ‘Appie’ Pema.

Steve Dietch, Vice President at Worldwide Go-To-Market/HP Cloud said: “Aptronics is the first HP partner in South Africa to achieve this level of certification. Gavin Williams has demonstrated strong CloudSystem Matrix competency in his mentored installation and we have great expectations for him as he delivers these critical services to cloud customers”.

“We are proud to have the company as a partner and we are excited about our joint opportunity to sell and deliver HP cloud solutions in South Africa this year,” added Dietch.

“This is a complex qualification to obtain and we hope it reinforces our continued commitment to staff development and service delivery,” concluded Pema.

Rectron, part of the Mustek Group, a leading distributor of computers, peripherals and accessories, now offers the option of electronic software delivery (ESD) for Microsoft products. Rectron is the second Microsoft distributor in Middle East and Africa, and the first in South Africa to launch ESD.

ESD is a secure way of delivering a product key directly to consumers and small businesses via the retail, e-tail and reseller channel. The offering aims to empower the channel by providing a new, convenient way of delivering Microsoft solutions.

The delivery method offers numerous benefits to the channel, including:

Faster turnaround times – Product keys are delivered within minutes, rather than days.Lower costs – Courier costs are eliminated as there is no physical media that needs to be delivered.

No stock risk – Not having stock on premises eliminates a number of risks, including theft and damage. Resellers can also deliver the solutions to their customers faster, without the risks associated with physically delivering products.

“We’re living in an age of instant gratification. People have become impatient; they are used to having immediate access to a plethora of apps at their disposal and are accustomed to making purchases with ease. We believe that this access should extend beyond personal usage and into business purchases within the channel too,” says Elaine Wang, Group Microsoft Business Unit Manager at Rectron. “The new electronic software delivery method provides the channel with a quick, convenient and hassle-free option for procuring Microsoft products. It boosts their reputation and trust among customers and enhances business relationships. As there are no delivery costs, the channel also saves money, which translates into a healthier bottom line. Best of all, it’s secure and there’s no learning curve.”

Resellers can order ESD products from Rectron in the same way they have ordered other products. Once an order is placed, Rectron systems automatically fetch the product tokens from Microsoft, which are emailed to the reseller. These emails contain activation links, which customers click on to download the software.

“Electronic software delivery is a channel differentiator,” concludes Wang. “In order to remain competitive, we need to think outside the box in terms of services and value proposition. Through this delivery method, we’re empowering the channel to improve service and delivery times to their clients, and are streamlining software installation and usage. As more and more services move into the cloud, and as more businesses leverage as-a-service offerings, ESD will become a fundamental competitive advantage for resellers.”

South Africa is the second most targeted country globally when it comes to Phishing attacks, says Drew van Vuuren, CEO of information security and privacy practice, 4Di Privaca. With the cost of phishing in South Africa amounting to approximately $320 million in 2013 alone and with South Africa accounting for 5% of the total volume of all phishing attacks globally, it’s not a matter of “if” you or your company are going to be a target, but “when”. If you are not worried about phishing attacks, you should be!

Phishing is a form of e-mail deception where cyber-criminal attempts to obtain sensitive information or cause disruption to an organisation’s business operations. Phishing can be defined as an act of sending an email to the user in order to steal his personal information such as bank account details, credit card information etc. The email falsely claims to be from an established organisation and makes the user surrender his private information that will be used for identity theft.

Such emails may direct the user to click on a link which is a website where they are said to update their personal information like passwords, credit card details, social security number or bank account number. This type of bogus website is specifically designed for information theft.

The most common form of Phishing is, “Spear Phishing”, a more targeted version of Phishing where an e-mail is sent that appears to be of significant interest to the targeted individual. Spear Phishing often has a high success rate as it bypasses traditional security defences and exploits vulnerable software.

Most companies choose to downplay the inevitable threat that Phishing attacks pose, despite the many publicised cases that have resulted in personal, corporate, financial and reputational damage.

Most, if not all businesses, spend money on external safeguards and security. They may invest in security personnel, closed circuit television cameras, alarms and perhaps on a more rudimentary level, a visitor sign-in book. What they neglect to consider, is that threats also lurk online. Such risks can be dangerous and often devastating.

The targeted nature of spear phishing can unleash a major attack on corporate well-being and an attacker may gain access to e-mail systems, social media, banking details and corporate log-in details. Another impact of successful phishing attacks is reputational, with the impact of the attack being almost immeasurable. Additionally, high profile individual victims can also take hits to their reputation, which in turn harms the company’s brand.

The most effective defence against phishing attacks is prevention. To prevent, or at least cut down, on phishing attacks, businesses need to start a continual education program that implements security awareness amongst its staff. Ignoring the pitfalls of phishing can put a company at risk. Organisations should be educated on behavioural practices that prevent successful phishing.

Implementing and adopting a security awareness capability will foster an environment that will empower organisations users with the ability to separate the wheat from the chaff so to say. With South Africa having such a diverse economic landscape and many of the financial services being delivered in the mid-tier market valuable personal information on individuals is handled daily by these companies.

These organisations are the ones who are targeted most regularly by nefarious groups, intent on ensuring the inadvertent sharing of that valuable information so that they can benefit profitably from selling that information on or using it to perform fraudulent activities.

The Microsoft Office 365 suite is a cloud-based version of traditional Microsoft Office software, and offers organisations a number of benefits. Office 365 is particularly suited to the Small to Medium Enterprise (SME) market, as the agility of these organisations makes the migration a fairly simple and straightforward task. Despite these benefits and the suitability of the solution, some SMEs remain reluctant to ‘take the plunge’ and migrate into the cloud, for a number of reasons. However, SMEs should be aware that moving to Microsoft Office 365 is not as complex as many would believe, and partnering with an established and credible IT outsource company can ensure they can take advantage of all of the benefits, with none of the worry.

The benefits the SME will gain after moving to Office 365 are countless. These include the typical advantages associated with the cloud, such as enhanced mobility and dramatically reduced investment in software and infrastructure. Migrating into the cloud also gives growing SMEs the ability to scale the number of licenses needed based on the number of people being employed at any given time. There is therefore no need to purchase an expensive annual license for a person who may only be with the organisation for a few months. The ability to leverage greater flexibility through a ‘pay as you use’ subscription-based model is a big draw card for many smaller businesses, and can save substantial sums of money.

In addition, Office 365 also offers SMEs access to the latest and greatest Microsoft Office tools and versions, without the cost of constantly upgrading. Furthermore, access to advanced features and functionality like Exchange Online, SharePoint Online, Lync Online and Microsoft Office Web Apps are also included. With Microsoft Office 365, SME users can now easily access sophisticated email archiving solutions as well as rich collaboration tools without massive additional investment into infrastructure that previously made these systems prohibitively expensive to implement.

These benefits are all easily achievable and well documented, but some SMEs remain reluctant to make the move into the cloud. One of the major concerns for the SME is downtime associated with the migration, as any time spent unproductively can cost the company precious income. However, the reality is that from the moment the decision is made to move to the cloud right through to the final cutover can all happen within a day. The migration itself takes around half an hour per user, barring any issues, and so the disruption caused is minimal. The process can even be conducted over the weekend, so that any issues can be ironed out and any necessary ‘fine tuning’ can take place outside of business hours.

Another concern for SME users is that their experience with the Office suite will be different in some way, or performance will be negatively impacted by the migration. For users on the latest version of the Office suite, the experience will be a seamless transition, with nothing but the way licenses are billed on the back end changing. However, if SMEs are still making use of older versions of Office such as 2007 or 2010, then a difference in the experience will be noticeable, much the same as if the organisation had upgraded their traditional Office licenses. In terms of performance, migrating to the cloud does not affect the speed of applications in a negative way. Users may even find that their experience is faster and smoother, since the applications are not reliant on a computer’s on-board memory but rather on the cloud-based servers.

Before embarking on a migration, however, it pays to research all of your options to make certain this is the right solution for your business. Once a decision to move to Office 365 is taken, it is advisable to backup any and all important emails and documents as an extra measure of protection during the migration. It is also helpful to consult with a specialist SME IT outsource provider, who will be able to assist with the entire back end of the migration to ensure the experience is seamless for the users.

For the SME market, there are very few cases where a migration to Office 365 will not offer substantial benefits. Apart from additional features and functionality, and access to the latest solutions and support, the cost per user on an annual basis is less than an annual subscription fee, and for that reason alone the move is a compelling one. This license is also valid for up to five devices for a single user. When features such as web applications, which make Office applications available on smartphones and tablets, are added into the equation to enable flexibility and mobility, the argument for Office 365 is even stronger. By partnering with an experienced specialist SME IT outsource provider with a proven track record, SMEs will be assured of a smooth migration so that they can leverage the benefits seamlessly.

According to the ‘Financial cyber threats in 2013’ study carried out by Kaspersky Lab, financial malware targeting Bitcoin became extremely popular in 2013. The number of attacks targeting the crypto-currency increased more than 2.5 times and accounted for 8.3 million incidents.

Bitcoin was created especially for making anonymous e-payments and has become extremely popular over the last few years. In early 2013, the Bitcoin exchange rate was $13.6. By December it reached a record peak, exceeding $1,200. During the year several slumps occurred, but since April 2013 the price of a single virtual coin has not dropped below $80. This inevitably attracted the attention of fraudsters. Adding to the problem, Bitcoins are often easy prey for cybercriminals: if users store Bitcoins on their computers in an unencrypted form, attackers only need to steal the wallet file to get information about the “coins” within and access the victim’s account.

More than 30 samples of finance-related malware were selected for Kaspersky Lab research. Nine of them were the programme designed to steal the crypto-currency. These nine represented a total of 29% of all financial cyber attacks performed using malicious applications.

The tools used by cybercriminals to steal Bitcoins can be divided into two categories. The first category includes programmes created to steal wallet files. Applications in the second category are designed to install software for Bitcoin generation (“mining”) on an infected computer. In absolute terms the Bitcoin wallet thieves performed twice as many attacks in 2013; however, the tools for “mining” developed more rapidly.

“During 2013 the value of Bitcoins increased more than 85 times, and of course that attracted the attention of cybercriminals. By the end of the year the number of users attacked with malware targeting Bitcoins was starting to close in on the number of those who faced more conventional banking cyber threats. Crypto-currency holders should be especially careful because it is almost impossible to recover any stolen money. This is the inherent risk in using a crypto-currency like Bitcoin that circulates without any government control,” commented Sergey Lozhkin, Senior Security Researcher at Kaspersky Lab.

To use crypto-currencies safely, Kaspersky Lab experts advise storing wallet files on encrypted media. For long-term storage a user can make a transfer to a dedicated wallet or put the details down on paper. It is also necessary to provide reliable computer protection against malicious software using a reliable Internet Security class solution.

Home users can benefit from Kaspersky Internet Security, a security solution which in addition to the comprehensive set of protection technologies includes the Safe Money technology which protects user data during banking and e-payment sessions.

BlackBerry Limited (NASDAQ: BBRY; TSX), a world leader in mobile communications, today announced that Science Applications International Corporation (NYSE: SAIC) is expanding its investment in BlackBerry® Enterprise Service 10 (BES10) for enterprise mobility management (EMM).

SAIC, which provides full lifecycle services and solutions in the technical, engineering and enterprise IT markets in the public and private sectors, has upgraded its BlackBerry Enterprise Servers to BES10 in order to manage both its current fleet of BlackBerry® 10 devices as well as its devices running Android and iOS operating systems. BES10 will ensure the security in SAIC’s multi-operating system environment while streamlining operations for administrators with a single management console.

“Implementing BlackBerry’s BES10 server provides us with a single management point to support mobile device communications,” said Robert Fecteau, SAIC’s Chief Information Officer. “This helps reduce overhead costs and allows us to focus training and development on enhancing skills needed to fully support secure mobility operations within the SAIC enterprise.”

“BES10 gives customers the power to create a customized EMM environment that reflects the diverse security and flexibility needs across their entire workforce,” said John Sims, President of Global Enterprise Services at BlackBerry. “SAIC will gain the advantage of BlackBerry’s comprehensive solution that brings everything together, efficiently and securely, while still providing the best value.”

For SAIC, security means protecting both corporate and client data, including that of their customers in commercial markets and federal, state and local governments. In addition to deploying BlackBerry 10 smartphones for their highest security requirements, SAIC is also utilizing Secure Work Space for iOS and Android, which is a multi-platform containerization solution managed through BES10. This technology securely separates sensitive corporate data from personal content, making Secure Work Space an ideal solution for organizations that desire the flexibility of a BYOD program with the control they demand for mobile communications.

The BES10 multi-platform solution allows customers to manage BlackBerry, iOS and Android devices from a single, highly secure, reliable platform. Around the globe, nearly 33,000 BES10 commercial and test servers have been installed to date.